Security Corner:

Security policy


October 20, 2010  5:49 PM

Why Trusting Users With Security is a Bad Idea



Posted by: Ken Harthun
cyber security, Security policy, Security practice

I have seen it happen time and...

October 10, 2010  1:54 PM

Five Poor Security Practices That Hackers Exploit



Posted by: Ken Harthun
cyber security, security audits, Security best practice, Security policy

Security audits are vital if you plan to keep your network safe in today's environment. It doesn't have to be complicated. Here are 10 of the most common poor security practices that hackers exploit.

  1. Using weak passwords - Don't even get me started on this one! Most of...


February 18, 2010  2:30 AM

Anonymity and the Internet



Posted by: Ken Harthun
anonymity, Internet, onion routing, Secure Computing, Security, Security policy

Bookmark and Share     0 Comments     RSS Feed     Email a friend


February 16, 2010  3:56 AM

Top Five Security Tips for Everyone



Posted by: Ken Harthun
Security, Security policy, Security practice, security tips

No matter what operating system you use for computing, security is a consideration. We connect to networks every day that we have little or no control over. Everyone uses email and there is no OS that can secure against or prevent a phishing attack. It comes down to a matter of best practices and...


January 31, 2010  10:41 PM

The No. 1 Mistake in Security: Failing to Educate Employees



Posted by: Ken Harthun
employee education, Security, security awareness, Security policy, Security practice

Ask almost any infosec expert what is the biggest mistake in security and he or she will answer that it's failing to educate employees. While certain professions that fall under HIPAA, GLBA and other legislation are required to implement security awareness programs, the vast majority of businesses...


January 23, 2010  4:51 PM

Web 2.0 Security: Corporate Espionage



Posted by: Ken Harthun
Corporate espionage, security awareness, Security policy, Security practice, User education, Web 2.0 Security


January 22, 2010  2:48 AM

Information Security? Heaven Help Us!



Posted by: Ken Harthun
data breach, Security, security awareness, Security policy, Security practice

Time for...


January 6, 2010  1:37 AM

ABA Recommends Using Dedicated PC for Online Banking



Posted by: Ken Harthun
Firewalls, Microsoft steady state, Online banking fraud, secrurity practice, Security, security awareness, Security policy

This is an idea that has been floating around for awhile. I recommended Convert a USB Thumb Drive into a...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


December 27, 2009  3:36 PM

Web 2.0 Security: Watch Those Passwords



Posted by: Ken Harthun
security awareness, Security policy, Security practice, Web 2.0 Security

Bookmark and Share     2 Comments     RSS Feed     Email a friend


December 13, 2009  11:33 PM

Golden Rule #14: If Spam Has You Irate, Obfuscate!



Posted by: Ken Harthun
14 Golden Rules of Computer Security, Email security, Security, Security policy, Security practice, spam

Spam email is not only a nuisance, it’s a...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: